One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at.

However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson.

Improving the security of construction sites

It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public.

Investing in adequate resources for construction site security can prevent several issues, including:

  • Theft of expensive tools and construction equipment
  • Cybersecurity breaches leading to loss of sensitive information such as invoice data
  • Arson resulting in loss of life and property
  • Vandalism of construction site property
  • Trespassing by unauthorized parties and exposure to construction site dangers
  • Risks of injuries that can result in litigation and legal claims

Identifying security issues

Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur.

They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site
Having a dedicated security team in place is a good first step in bolstering a construction site’s security

For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them.

Construction site security checklist

To guide you, here is a sample template that you can use to form your own construction site security checklist.




1. Does the site have designated security coordinators?


2. Are the security coordinators available for contact during non-business hours?


3.  Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies?


4. Does the construction site have a written security plan, including procedures for specific scenarios?


5. If so, are construction site employees aware of the security plan? 





1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.)


2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.)


3. Does the project have a list of the names of operators handling the machinery?


4. Are all the machinery fitted with immobilizers and tracking devices when appropriate?


5. Are all the machinery stored in a secure area with a proper surveillance system?


6. Are the keys to the machinery stored in a separate, secure area?





1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.)


2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.)


3. Are tools and equipment fitted with tags and tracking devices when appropriate?


4. Are tools and equipment stored in a secure place?





1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen?


2. Are there procedures in place for checking materials that go in and out of the construction site?


3. Is there a set schedule for checking materials and equipment?


4. If so, do the records show that the schedule is followed strictly?


5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc)





1. Is there a physical barrier in place to secure the site?


2. Is the number of gates kept to a minimum?


3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site?


4. Are security warnings displayed prominently at all entry points?


5. Are entry points adequately secured? (With  industry-grade padlocks, steel chains, etc.)


6. Is there an alarm system?


7. Is the locking system integrated with the alarm?


8. Is the site perimeter regularly inspected?


9. Are “NO TRESPASSING” signs displayed prominently along the perimeter?





1. Is there sufficient lighting on the construction site?


2. Is there a dedicated staff member assigned to check if the lighting is working properly?


3. Is the site protected by CCTV cameras?


4. Are there signs posted on site indicating the presence of security cameras?


5. Are there motion detection lights installed on-site?





1. Is there a policy on employee theft?


2. Are employees aware of the policy?


3. Are employees required to check in and check out company properties when using them?


4. Are staff members encouraged to report suspicious activity?


5. Is there a hotline employees can call to report security lapses and breaches?





1. Are visitors checking in and out?


2. Are vehicles entering and exiting the site recorded?





1. Are the construction site’s documents and other sensitive data stored in the cloud securely?


2. Does the company have a strong password policy?


3. Are asset-tracking data accessible online?


4. Are confidential documents and data regularly backed up?


5. Are employees well-informed about current cyberattack methods such as phishing?


Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties.  Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

In case you missed it

How Does Audio Enhance Security System Performance?
How Does Audio Enhance Security System Performance?

Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems? 

What Are The Mainstream Uses For Thermal Cameras?
What Are The Mainstream Uses For Thermal Cameras?

The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?

Identiv Unveils Cloud Access Control and Frictionless Mobile Solution
Identiv Unveils Cloud Access Control and Frictionless Mobile Solution

Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app.  No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with.  We're there with them across all of it, because that's the true reality.